Iet Information Security

Iet Information Security

信息安全

  • 4区 中科院分区
  • Q3 JCR分区

高引用文章

文章名称 引用次数
Mimic defense: a designed-in cybersecurity defense framework 15
Least lion optimisation algorithm (LLOA) based secret key generation for privacy preserving association rule hiding 10
Malware classification based on API calls and behaviour analysis 8
Network intrusion detection algorithm based on deep neural network 8
Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem 7
Division cryptanalysis of block ciphers with a binary diffusion layer 7
New algorithms for the unbalanced generalised birthday problem 7
Detection of double compression in HEVC videos based on TU size and quantised DCT coefficients 5
Privacy preserving big data mining: association rule hiding using fuzzy logic approach 5
Attribute-based broadcast encryption scheme for lightweight devices 5
Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control 4
Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine 4
Dynamic asymmetric group key agreement protocol with traitor traceability 4
Detecting new generations of threats using attribute-based attack graphs 4
Leveraging deep neural networks for anomaly-based web application firewall 4
Public key authenticated encryption with keyword search: revisited 3
Dynamic API call sequence visualisation for malware classification 3
Detecting LDoS attack bursts based on queue distribution 3
Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation 3
Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting 3
Efficient identity-based blind message recovery signature scheme from pairings 3
Database authentication watermarking scheme in encrypted domain 3
Parallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units 2
Degenerate curve attacks: extending invalid curve attacks to Edwards curves and other models 2
Multi-objective auto-regressive whale optimisation for traffic-aware routing in urban VANET 2
Dynamical model for individual defence against cyber epidemic attacks 2
Identity-based encryption resilient to continuous key leakage 2
Privacy preserving weighted similarity search scheme for encrypted data 2
Secure data storage and intrusion detection in the cloud using MANN and dual encryption through various attacks 2
Analysis of dynamic code updating in Android with security perspective 2
Multi-hop interpersonal trust assessment in vehicular ad-hoc networks using three-valued subjective logic 1
Fast Montgomery modular multiplier for Rivest-Shamir-Adleman cryptosystem 1
HAP: detection of HTTP flooding attacks in cloud using diffusion map and affinity propagation clustering 1
Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model 1
Event reconstruction using temporal pattern of file system modification 1
How to construct a verifiable multi-secret sharing scheme based on graded encoding schemes 1
PriVeto: a fully private two-round veto protocol 1
Dynamic reencryption of return addresses 1
Meet-in-the-middle attacks on round-reduced tweakable block cipher Deoxys-BC 1
HPCgnature: a hardware-based application-level intrusion detection system 1
Costly freeware: a systematic analysis of abuse in download portals 1
Security evaluation and design elements for a class of randomised encryptions 1
Smartphone passcode prediction 1
Observations on the truncated differential of SP block ciphers and their applications to mCrypton and CRYPTON V1.0 1
Linear complexity of Legendre-polynomial quotients 1
Method for measuring the privacy level of pre-published dataset 1
OPEXA: analyser assistant for detecting over-privileged extensions 1
Vulnerability modelling of crypto-chips against scan-based attacks 1
Implementation of single-packet hybrid IP traceback for IPv4 and IPv6 networks 1
Securing RSA against power analysis attacks through non-uniform exponent partitioning with randomisation 1